Code-Based Cryptography and Its Place in Quantum-Safe Strategies

Saved in:
Bibliographic Details
Title: Code-Based Cryptography and Its Place in Quantum-Safe Strategies
Authors: Aasim Zafar, Syed Shamikh Iqbal
Source: Advances in Information Security, Privacy, and Ethics ISBN: 9798369392201
Publisher Information: IGI Global, 2024.
Publication Year: 2024
Description: Quantum computation has progressed to the point where it is now a significant threat to traditional cryptographic algorithms such as RSA and ECC. In this chapter, we focus on the topic of code-based cryptography, which represents another important piece in the post-quantum cryptography puzzle. Codes-based cryptography relies on error-correcting codes in order to instantiate encryption schemes provably secure against quantum attacks. We focus mainly on the McEliece and Niederreiter cryptosystems since these systems are known to be secure against quantum algorithms. The reason for that is based essentially on decoding the arbitrary linear codes associated with those systems. However, this chapter also discusses the practical issues involved with the implementation of these systems: managing cryptographic keys and the need for efficient processing methods. Applications include secure communications applications and future directions such as lightweight codes and hybrid constructions. Code-based cryptography has a significant role in protecting the data in the era of quantum computing.
Document Type: Part of book or chapter of book
DOI: 10.4018/979-8-3693-9220-1.ch004
Accession Number: edsair.doi...........349b00d6d094c8de04b1135f5f871a5f
Database: OpenAIRE
Description
Abstract:Quantum computation has progressed to the point where it is now a significant threat to traditional cryptographic algorithms such as RSA and ECC. In this chapter, we focus on the topic of code-based cryptography, which represents another important piece in the post-quantum cryptography puzzle. Codes-based cryptography relies on error-correcting codes in order to instantiate encryption schemes provably secure against quantum attacks. We focus mainly on the McEliece and Niederreiter cryptosystems since these systems are known to be secure against quantum algorithms. The reason for that is based essentially on decoding the arbitrary linear codes associated with those systems. However, this chapter also discusses the practical issues involved with the implementation of these systems: managing cryptographic keys and the need for efficient processing methods. Applications include secure communications applications and future directions such as lightweight codes and hybrid constructions. Code-based cryptography has a significant role in protecting the data in the era of quantum computing.
DOI:10.4018/979-8-3693-9220-1.ch004